<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to edit my search to display individual event counts for each sourcetype? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-edit-my-search-to-display-individual-event-counts-for/m-p/225720#M66571</link>
    <description>&lt;P&gt;I have the following search and it works pretty well, however I need to see the event counts for each of the sourcetypes individually not as total count.  &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=windows (splunk_server=* OR splunk_server=*) OR (sourcetype="WinEventLog:Security" OR sourcetype="WinEventLog:Application" OR sourcetype="WinEventLog:System") | chart count values(sourcetype) as index by splunk_server |  table splunk_server index count | rename splunk_server TO abc-host |  rename index TO Log-Type
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Tue, 10 Jan 2017 18:05:23 GMT</pubDate>
    <dc:creator>bluemarvel</dc:creator>
    <dc:date>2017-01-10T18:05:23Z</dc:date>
    <item>
      <title>How to edit my search to display individual event counts for each sourcetype?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-edit-my-search-to-display-individual-event-counts-for/m-p/225720#M66571</link>
      <description>&lt;P&gt;I have the following search and it works pretty well, however I need to see the event counts for each of the sourcetypes individually not as total count.  &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=windows (splunk_server=* OR splunk_server=*) OR (sourcetype="WinEventLog:Security" OR sourcetype="WinEventLog:Application" OR sourcetype="WinEventLog:System") | chart count values(sourcetype) as index by splunk_server |  table splunk_server index count | rename splunk_server TO abc-host |  rename index TO Log-Type
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 10 Jan 2017 18:05:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-edit-my-search-to-display-individual-event-counts-for/m-p/225720#M66571</guid>
      <dc:creator>bluemarvel</dc:creator>
      <dc:date>2017-01-10T18:05:23Z</dc:date>
    </item>
    <item>
      <title>Re: How to edit my search to display individual event counts for each sourcetype?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-edit-my-search-to-display-individual-event-counts-for/m-p/225721#M66572</link>
      <description>&lt;P&gt;If I understood the original intention of you search filter, using &lt;CODE&gt;tstats&lt;/CODE&gt; will be faster.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| tstats count where index=windows OR (sourcetype="WinEventLog:Security" OR sourcetype="WinEventLog:Application" OR sourcetype="WinEventLog:System") by index sourcetype splunk_server 
| table sourcetype splunk_server index count 
| rename splunk_server TO abc-host 
| rename index TO Log-Type
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 10 Jan 2017 18:15:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-edit-my-search-to-display-individual-event-counts-for/m-p/225721#M66572</guid>
      <dc:creator>rjthibod</dc:creator>
      <dc:date>2017-01-10T18:15:37Z</dc:date>
    </item>
    <item>
      <title>Re: How to edit my search to display individual event counts for each sourcetype?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-edit-my-search-to-display-individual-event-counts-for/m-p/225722#M66573</link>
      <description>&lt;P&gt;@bluemarvel, did my answer give you what you needed? &lt;/P&gt;</description>
      <pubDate>Thu, 12 Jan 2017 18:48:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-edit-my-search-to-display-individual-event-counts-for/m-p/225722#M66573</guid>
      <dc:creator>rjthibod</dc:creator>
      <dc:date>2017-01-12T18:48:53Z</dc:date>
    </item>
    <item>
      <title>Re: How to edit my search to display individual event counts for each sourcetype?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-edit-my-search-to-display-individual-event-counts-for/m-p/225723#M66574</link>
      <description>&lt;P&gt;not exactly ----the query gives me a total count of for all of the sources combined , I would like to see totals of each individually&lt;BR /&gt;
                                                                                                                 total :135014&lt;BR /&gt;
MSAD:NT6:DNS-Health&lt;BR /&gt;
MSAD:NT6:DNS-Zone-Information&lt;BR /&gt;
MSAD:NT6:Health&lt;BR /&gt;
MSAD:NT6:Netlogon&lt;BR /&gt;
MSAD:NT6:Replication&lt;BR /&gt;
MSAD:NT6:SiteInfo&lt;BR /&gt;
WinEventLog:DNS-Server&lt;BR /&gt;
WinEventLog:Directory-Service&lt;BR /&gt;
WindowsUpdateLog&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jan 2017 22:41:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-edit-my-search-to-display-individual-event-counts-for/m-p/225723#M66574</guid>
      <dc:creator>bluemarvel</dc:creator>
      <dc:date>2017-01-12T22:41:46Z</dc:date>
    </item>
    <item>
      <title>Re: How to edit my search to display individual event counts for each sourcetype?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-edit-my-search-to-display-individual-event-counts-for/m-p/225724#M66575</link>
      <description>&lt;P&gt;I think I am missing something. The query I provided should give you a table with the total count of events per index, sourcetype, and server.  For example, here is my own data using my query (I MD5'ed my host field). If this was your data, what field am I missing or what is out of place, because your last response does not clarify the request for me. Sorry.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; sourcetype               abc-host      Log-Type      count
 WinEventLog:Application  f6a667...   wineventlog     140
 WinEventLog:Security    f6a667...   wineventlog     169
 WinEventLog:System    f6a667...   wineventlog      611
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 12 Jan 2017 23:31:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-edit-my-search-to-display-individual-event-counts-for/m-p/225724#M66575</guid>
      <dc:creator>rjthibod</dc:creator>
      <dc:date>2017-01-12T23:31:31Z</dc:date>
    </item>
    <item>
      <title>Re: How to edit my search to display individual event counts for each sourcetype?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-edit-my-search-to-display-individual-event-counts-for/m-p/225725#M66576</link>
      <description>&lt;P&gt;yes, it did thank you, had to re-arrange some things &lt;/P&gt;</description>
      <pubDate>Fri, 13 Jan 2017 16:02:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-edit-my-search-to-display-individual-event-counts-for/m-p/225725#M66576</guid>
      <dc:creator>bluemarvel</dc:creator>
      <dc:date>2017-01-13T16:02:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to edit my search to display individual event counts for each sourcetype?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-edit-my-search-to-display-individual-event-counts-for/m-p/225726#M66577</link>
      <description>&lt;P&gt;Glad to hear it was straightened out.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Jan 2017 16:17:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-edit-my-search-to-display-individual-event-counts-for/m-p/225726#M66577</guid>
      <dc:creator>rjthibod</dc:creator>
      <dc:date>2017-01-13T16:17:58Z</dc:date>
    </item>
  </channel>
</rss>

